Impact
Briefcase creates an MSI installer that, when installed for All Users, generates a supporting directory which inherits the parent directory's permissions. The inherited permissions allow a low‑privileged but authenticated user to replace or modify binaries installed by the application. If an administrator later executes the altered binary, it runs with elevated privileges. This flaw is a classic directory traversal/permission issue, classified as CWE‑732 and representing a high‑severity privilege escalation risk.
Affected Systems
The vulnerability affects Briefcase versions 0.3.0 up to and including 0.3.25. Repairs were introduced in Briefcase 0.3.26, and the same templates used in 0.4.0 and 0.4.1 remain secure. Users deploying earlier releases on Windows systems must verify they are not using these vulnerable ranges.
Risk and Exploitability
The CVSS score of 7.3 reflects a high risk once the vulnerability is exploited. Although no EPSS value is available and the flaw is not yet listed in the CISA KEV catalog, the attack model is locally feasible: a legitimate user who can install an MSI for All Users can modify the files. An attacker would need to influence the MSI installation path or intentionally place the installer in a privileged directory. Once the binaries are altered, the attacker can gain elevated privileges on the host if an administrator subsequently runs the tampered executable. Given the local nature of the attack, containment requires restricting MSI install scope or promptly applying the vendor patch.
OpenCVE Enrichment
Github GHSA